
We’re excited to introduce a powerful new capability in the Upwind Cloud Security Platform – enhancing security by providing seamless visibility into highly privileged identities for every containerized resource in your cloud environment. Now available directly in the Upwind Topology Map, this feature helps detect and mitigate excessive permissions, reducing the risk of privilege escalation attacks and unauthorized access.

This enhancement makes it even easier to visualize Upwind’s runtime-driven approach, going beyond traditional CWPP solutions. It correlates real-time network topology, privileged identities, posture misconfigurations, threats, vulnerabilities, and API weaknesses – giving you deeper contextualized security insights to prioritize actual risks.
With this update, you can now easily view high-privilege source information, including:
- Cloud IAM High-Privilege Roles
- Kubernetes High-Privilege Roles
- Kubernetes Security Context
- Pivot to Cloud – K8s Resources with Cloud Permissions

This granular identity insight makes it even easier to rapidly assess resource risk context and proactively remediate unnecessary privileges, which ensures stronger protection for your most critical cloud assets. Among other benefits, it helps identify overly permissive Kubernetes service accounts that could allow unintended access to cloud resources, reducing the risk of lateral movement by attackers.

By leveraging Upwind’s correlated container and identity security capabilities, security teams can connect identity risk with vulnerabilities, threats, posture findings, and APIs, achieving holistic protection across containerized environments. To learn how to start correlating identity context with risk findings, schedule a demo today.